{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T02:04:22Z","timestamp":1776305062636,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030672195","type":"print"},{"value":"9783030672201","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67220-1_4","type":"book-chapter","created":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T08:03:07Z","timestamp":1610784187000},"page":"43-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Automated Validation of State-Based Client-Centric Isolation with TLA$$^+$$"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7477-9967","authenticated-orcid":false,"given":"Tim","family":"Soethout","sequence":"first","affiliation":[]},{"given":"Tijs","family":"van der Storm","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2686-7409","authenticated-orcid":false,"given":"Jurgen J.","family":"Vinju","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,17]]},"reference":[{"key":"4_CR1","unstructured":"Adya, A.: Weak consistency: a generalized theory and optimistic implementations for distributed transactions. Ph.D. thesis, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science (1999)"},{"issue":"3","key":"4_CR2","doi-asserted-by":"publisher","first-page":"181","DOI":"10.14778\/2732232.2732237","volume":"7","author":"P Bailis","year":"2013","unstructured":"Bailis, P., Davidson, A., Fekete, A., Ghodsi, A., Hellerstein, J.M., Stoica, I.: Highly available transactions - virtues and limitations. Proc. VLDB Endow. 7(3), 181\u2013192 (2013). https:\/\/doi.org\/10.14778\/2732232.2732237","journal-title":"Proc. VLDB Endow."},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/BFb0020949","volume-title":"Hybrid Systems III","author":"J Bengtsson","year":"1996","unstructured":"Bengtsson, J., Larsen, K., Larsson, F., Pettersson, P., Yi, W.: UPPAAL\u2014a tool suite for automatic verification of real-time systems. In: Alur, R., Henzinger, T.A., Sontag, E.D. (eds.) HS 1995. LNCS, vol. 1066, pp. 232\u2013243. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/BFb0020949"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-14295-6_31","volume-title":"Computer Aided Verification","author":"S Blom","year":"2010","unstructured":"Blom, S., van de Pol, J., Weber, M.: LTSmin: distributed and symbolic reachability. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 354\u2013359. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14295-6_31"},{"key":"4_CR5","unstructured":"Brooker, M., Chen, T., Ping, F.: Millions of tiny databases. In: Bhagwan, R., Porter, G. (eds.) 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, Santa Clara, CA, USA, 25\u201327 February 2020, pp. 463\u2013478. USENIX Association (2020)"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Crooks, N., Pu, Y., Alvisi, L., Clement, A.: Seeing is believing. In: Proceedings of the ACM Symposium on Principles of Distributed Computing, pp. 73\u201382. ACM, July 2017. https:\/\/doi.org\/10.1145\/3087801.3087802","DOI":"10.1145\/3087801.3087802"},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1145\/1071610.1071615","volume":"30","author":"A Fekete","year":"2005","unstructured":"Fekete, A., Liarokapis, D., O\u2019Neil, E.J., O\u2019Neil, P.E., Shasha, D.E.: Making snapshot isolation serializable. ACM Trans. Database Syst. 30(2), 492\u2013528 (2005). https:\/\/doi.org\/10.1145\/1071610.1071615","journal-title":"ACM Trans. Database Syst."},{"issue":"OOPSLA","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3133933","volume":"1","author":"VB Gomes","year":"2017","unstructured":"Gomes, V.B., Kleppmann, M., Mulligan, D.P., Beresford, A.R.: Verifying strong eventual consistency in distributed systems. Proc. ACM Program. Lang. 1(OOPSLA), 1\u201328 (2017). https:\/\/doi.org\/10.1145\/3133933","journal-title":"Proc. ACM Program. Lang."},{"issue":"1","key":"4_CR9","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1132863.1132867","volume":"31","author":"J Gray","year":"2006","unstructured":"Gray, J., Lamport, L.: Consensus on transaction commit. ACM Trans. Database Syst. 31(1), 133\u2013160 (2006). https:\/\/doi.org\/10.1145\/1132863.1132867","journal-title":"ACM Trans. Database Syst."},{"key":"4_CR10","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9946.001.0001","volume-title":"Modeling and Analysis of Communicating Systems","author":"JF Groote","year":"2014","unstructured":"Groote, J.F., Mousavi, M.R.: Modeling and Analysis of Communicating Systems. MIT Press, Cambridge (2014)"},{"key":"4_CR11","unstructured":"Gustafson, J., Wang, G.: Hardening Kafka replication (2020). https:\/\/github.com\/hachikuji\/kafka-specification"},{"key":"4_CR12","volume-title":"The SPIN Model Checker - Primer and Reference Manual","author":"GJ Holzmann","year":"2004","unstructured":"Holzmann, G.J.: The SPIN Model Checker - Primer and Reference Manual. Addison-Wesley, Boston (2004)"},{"key":"4_CR13","volume-title":"Software Abstractions - Logic, Language, and Analysis","author":"D Jackson","year":"2006","unstructured":"Jackson, D.: Software Abstractions - Logic, Language, and Analysis. MIT Press, Cambridge (2006)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Kingsbury, K., Alvaro, P.: Elle: inferring isolation anomalies from experimental observations. CoRR abs\/2003.10554 (2020)","DOI":"10.14778\/3430915.3430918"},{"key":"4_CR15","unstructured":"Kinsbury, K.: Jepsen: distributed systems safety research (2020). http:\/\/jepsen.io\/"},{"key":"4_CR16","unstructured":"Kinsbury, K.: Knossos (2020). https:\/\/github.com\/jepsen-io\/knossos"},{"key":"4_CR17","volume-title":"Designing Data-Intensive Applications: The Big Ideas behindReliable, Scalable, and Maintainable Systems","author":"M Kleppmann","year":"2016","unstructured":"Kleppmann, M.: Designing Data-Intensive Applications: The Big Ideas behindReliable, Scalable, and Maintainable Systems. O\u2019Reilly, Sebastopol (2016)"},{"key":"4_CR18","unstructured":"Kleppmann, M.: Hermitage: testing transaction isolation levels (2020). https:\/\/github.com\/ept\/hermitage"},{"key":"4_CR19","unstructured":"Lamport, L.: The PlusCal Algorithm Language - Microsoft Research. https:\/\/www.microsoft.com\/en-us\/research\/publication\/pluscal-algorithm-language\/"},{"key":"4_CR20","volume-title":"Specifying Systems, the TLA+ Language and Tools for Hardwareand Software Engineers","author":"L Lamport","year":"2002","unstructured":"Lamport, L.: Specifying Systems, the TLA+ Language and Tools for Hardwareand Software Engineers. Addison-Wesley, Boston (2002)"},{"key":"4_CR21","unstructured":"Microsoft: High-level TLA+ specifications for the five consistency levels offered by Azure Cosmos DB (2020). https:\/\/github.com\/Azure\/azure-cosmos-tla"},{"issue":"4","key":"4_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2699417","volume":"58","author":"C Newcombe","year":"2015","unstructured":"Newcombe, C., Rath, T., Zhang, F., Munteanu, B., Brooker, M., Deardeuff, M.: How amazon web services uses formal methods. Commun. ACM 58(4), 66\u201373 (2015). https:\/\/doi.org\/10.1145\/2699417","journal-title":"Commun. ACM"},{"key":"4_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77525-8_185","volume-title":"Encyclopedia of Big Data Technologies","author":"NM Pregui\u00e7a","year":"2019","unstructured":"Pregui\u00e7a, N.M., Baquero, C., Shapiro, M.: Conflict-free replicated data types CRDTs. In: Sakr, S., Zomaya, A.Y. (eds.) Encyclopedia of Big Data Technologies. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-77525-8_185"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Soethout, T.: TimSoethout\/tla-ci: TLA+ specifications used in \u201cAutomated Validation of State-Based Client- Centric Isolation with TLA+\". Zenodo (2020). https:\/\/doi.org\/10.5281\/zenodo.3961617","DOI":"10.5281\/zenodo.3961617"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Soethout, T., van der Storm, T., Vinju, J.: Path-sensitive atomic commit. Programming 5(1) (2020). https:\/\/doi.org\/10.22152\/programming-journal.org\/2021\/5\/3","DOI":"10.22152\/programming-journal.org\/2021\/5\/3"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Soethout, T., van der Storm, T., Vinju, J.J.: Static local coordination avoidance for distributed objects. In: Proceedings of the 9th ACM SIGPLAN International Workshop on Programming Based on Actors, Agents, and Decentralized Control - AGERE 2019, pp. 21\u201330. ACM Press, Athens (2019). https:\/\/doi.org\/10.1145\/3358499.3361222","DOI":"10.1145\/3358499.3361222"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Stoel, J., van der Storm, T., Vinju, J., Bosman, J.: Solving the bank with Rebel: on the design of the Rebel specification language and its application inside a bank. In: Proceedings of the 1st Industry Track on Software Language Engineering - ITSLE 2016, pp. 13\u201320. ACM Press (2016). https:\/\/doi.org\/10.1145\/2998407.2998413","DOI":"10.1145\/2998407.2998413"},{"key":"4_CR28","volume-title":"Distributed Systems - Principles and Paradigms","author":"AS Tanenbaum","year":"2007","unstructured":"Tanenbaum, A.S., van Steen, M.: Distributed Systems - Principles and Paradigms, 2nd edn. Pearson Education, Upper Saddle River (2007)","edition":"2"},{"issue":"1","key":"4_CR29","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/103140.103145","volume":"16","author":"G Weikum","year":"1991","unstructured":"Weikum, G.: Principles and realization strategies of multilevel transaction management. ACM Trans. Database Syst. 16(1), 132\u2013180 (1991). https:\/\/doi.org\/10.1145\/103140.103145","journal-title":"ACM Trans. Database Syst."}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods. SEFM 2020 Collocated Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67220-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,11]],"date-time":"2022-12-11T22:26:00Z","timestamp":1670797560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-67220-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030672195","9783030672201"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67220-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEFM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Engineering and Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sefm2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/event.cwi.nl\/sefm2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}